conifer 发表于 2025-3-30 09:20:22
AuthBlock: Authentication Framework Using Ethereum Blockchain,aring of user data without their consent, password stealing on a large scale, etc. By decentralizing ownership of credentials and providing a framework for confirming one’s record in an unalterable chain of data, i.e., Distributed Ledger Technology (DLT) in general and blockchain can provide a solut保守党 发表于 2025-3-30 13:28:44
Vision-Based Driver Assistance System to Detect Mountainous Roads Using GLCM and Haralick Texture F a computationally efficient computer vision and machine learning-based approach to detect these roads. The dataset includes damaged, steep, and narrow mountainous roadways. The Field of View (FoV) creation step in preprocessing increased the algorithm’s accuracy. The five statistical texture parame掺和 发表于 2025-3-30 18:56:06
Vision-Based Weather Condition Recognition for Driver Assistance,s. The decreased scene visibility in unfavorable weather conditions (fog/rain) is one of the issues that drivers experience while driving. The contrast and color of acquired photographs are poor in hazy weather circumstances, making it difficult to discern the image. A technique to separate images o灾难 发表于 2025-3-31 00:31:01
Vision-Based Distracted Driver Detection Using a Fusion of SIFT and ORB Feature Extraction,f these crashes end in fatalities. In this study, we are using computer vision with machine learning, to provide a unique technique to determine whether a car driver is driving the car safely or not. In this study, two feature extraction approaches SIFT and ORB were implemented, with an emphasis onPruritus 发表于 2025-3-31 04:19:33
http://reply.papertrans.cn/87/8637/863631/863631_55.png船员 发表于 2025-3-31 06:02:55
http://reply.papertrans.cn/87/8637/863631/863631_56.pngitinerary 发表于 2025-3-31 11:08:57
http://reply.papertrans.cn/87/8637/863631/863631_57.png薄荷醇 发表于 2025-3-31 15:34:05
,A Novel Fake Job Posting Detection: An Empirical Study and Performance Evaluation Using ML and Enseers to scam people online and acquire easy money. Numerous cyber crimes worldwide exist, including identity theft and fake job postings. Nowadays, many companies post job openings online, making recruitment simple. Consequently, fraudsters also post job openings online to obtain money and personal iMURAL 发表于 2025-3-31 18:28:18
http://reply.papertrans.cn/87/8637/863631/863631_59.png致词 发表于 2025-4-1 00:04:19
,Machine Learning-Based Malware Detection and Classification in Encrypted TLS Traffic,ecurity. As a result, network security measures play an important role in countering these cyber threats. Existing malware detection techniques are unable to detect them effectively. A novel Ensemble Machine Learning (ML)-based malware detection technique from Transport Layer Security (TLS)-encrypte